Author of the publication

Toward Provable Security of Substitution-Permutation Encryption Networks.

, and . Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 43-56. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Hybrid Principal Component Analysis Based on Wavelets and Moving Median Filter., , and . ISNN (2), volume 4492 of Lecture Notes in Computer Science, page 994-1001. Springer, (2007)LDFGB Algorithm for Anomaly Intrusion Detection., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 396-404. Springer, (2014)A Hybrid System for Reducing Memory and Time Overhead of Intrusion Detection System., and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 386-395. Springer, (2014)Toward Provable Security of Substitution-Permutation Encryption Networks., and . Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 43-56. Springer, (1998)Intrusion Detection System based on Complex Event Processing in RFID middleware., , , and . RACS, page 125-129. ACM, (2016)Construction of a Safe Web Service Based on WSE., , , and . CW, page 481-486. IEEE Computer Society, (2008)An efficient privacy protection in mobility social network services with novel clustering-based anonymization., , , and . EURASIP J. Wirel. Commun. Netw., (2016)Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph., , , and . RACS, page 196-201. ACM, (2017)Mslar: Microbial synthetic lethal and rescue database., , , , , , and . PLoS Comput. Biol., (2023)Combining principal component analysis, decision tree and naïve Bayesian algorithm for adaptive intrusion detection., and . RACS, page 312-316. ACM, (2013)